Plesk VPS Cron Emails

Overview Occasionally, you may receive an email notifying you of a Cron Daemon failure or error. This will generally have the subject of the email as: While the error may be confusing, not all of them are necessarily...
  • 0
  • 66

Microsoft SQL Server SPLA Licensing Options

Overview The world of Microsoft SQL Server licensing can be confusing and complicated, especially when there’s different licensing agreements and even differences between the agreements with different regions around the world. Under the Microsoft Service Provider Licencing Agreement...
  • 0
  • 89

How to Force a User Sign Out on a Windows Server

Overview If you administer Windows servers you may sometimes find Remote Desktop (RDP) users cannot reconnect to their Remote Desktop Sessions due to local PC issues. The resolution to this issue is to remotely force user sign out...
  • 0
  • 122

Spam Assassin Error Emails from Plesk

Overview Recently the Spam Assassin app has deprecated one of its update repositories and this has been generating errors and sending emails to the Plesk Administrator. You will see the following error show up in your Inbox: Please...
  • 1
  • 162

Apache Pagespeed – Enable per website

Overview Apache Pagespeed (formerally known as Google mod_pagespeed) is an an extension available to both Apache and NGINX which automatically applies web performance best practices. This includes functions such as CSS minification, image optimisation, deferral of JavaScript loading...
  • 0
  • 169

How to Set Resource Limits for a Plesk Service Plan

Overview If you have your own Plesk server, you can use service plans to limit resources. This allows you to set different plans for your customers as well as offering upgrade paths. This article will step you through...
  • 0
  • 233

Slow MariaDB SQL queries in Statistics state

Overview One of the jobs of a database when executing a query is to map out the best way to execute the query itself. While in most instances MariaDB (and MySQL) does a great job of optimisation, for...
  • 0
  • 256

ImunifyAV Scanning

Overview Conetix uses a multi-layered approach to security, which involves the use of different security tools and services at different levels. One of these tools is ImunifyAV, which is a highly efficient malware and detection engine aimed directly...
  • 0
  • 551

Plesk License Key is Invalid

Overview If you’ve attempted to login to your Plesk based Virtual Private Server, and see the following error: The error does not mean the license key is invalid but simply that the server has run very low on...
  • 0
  • 556

Automatic CentOS 6 Updates

Overview Applying system updates is an essential part of managing a server. This is to ensure that security patches and bug updates are applied and will ensure that you system stays running. With stable Linux platforms such as...
  • 0
  • 619

Meltdown and Spectre Vulnerability

Overview Since a patch hit the Linux kernel in late December 2017, it indicated that there was a potential (and critical) security flaw in the way CPU’s allocate memory.  As no official security report had been published, there had been a...
  • 0
  • 628

Does Conetix Support APC for PHP?

Overview Conetix does not provide support for the Alternative PHP Cache (APC) nor APCu out of the box, as it's not a standard PHP component. However, it's important to look at what part of the caching you're actually after....
  • 0
  • 642

Plesk – Server reached max_children PHP error

Overview For a PHP based site, you may (on rare occasions) encounter an error with the number of FPM processes allocated to your site. The error message will look something like: server reached max_children setting (5), consider raising...
  • 0
  • 646

Moving Email to Conetix via Mail Importer

Overview This article will guide you through importing email from an external IMAP server onto your subscription with Conetix.This article is suitable for VPS and shared hosting customers and assumes the source inbox is not pointed to Conetix...
  • 3
  • 668

How can I purchase a Plesk 12.5 License?

Overview How can I purchase a Plesk 12.5 license key for my server? *How can I purchase a Cloudlinux & Plesk 12.5 license bundle key for my server? *How can I purchase a Kernelcare license key for my server? *Only Available on Linux Platform Each license is available in...
  • 0
  • 685

MySQL Error when importing database

Overview When moving between servers, sometimes the large database sizes can cause issues with a standard MySQL / MariaDB configuration. If you see the following when importing: MySQL Error 2006 (HY000) at line XX: MySQL server has gone away...
  • 0
  • 706

How to Add Custom Panel Branding in Plesk for a VPS

Overview The following support article demonstrates how to add a customized the logo within a VPS, replacing the default Parallels logo, in the top left hand corner of Plesk. This can be done to customise your Plesk panel...
  • 0
  • 714

Penetration Testing – Request Permission

Overview Before conducting an external Penetration Testing (also known as "pen testing"), you must seek written permission from Conetix before proceeding. As many of the tests involved use scripts and automated systems which use brute force or multiple attacks to test,...
  • 0
  • 716

How to add a new FTP account in Plesk

Overview The following support article demonstrates how to create a new FTP account in a subscription within Plesk. Instructions Once you have logged into Plesk, click on “Domains” and then the domain for which you want to create...
  • 0
  • 718

Plesk – Diskspace Usage Viewer Extension

Overview This article will detail how to use the Diskspace Usage Viewer Extension in Plesk Onyx and Plesk Obsidian. This extension can be used to easily and pictorially display the disk usage and help show where the space...
  • 0
  • 728

Plesk Onyx – Enable Fail2Ban

Overview This article will show you how to enable Fail2Ban within your Plesk Onyx based Virtual Private Server (VPS). Fail2Ban is a security module which can limit brute force attacks to your server. NOTE: Secure passwords are far more critical than blocking...
  • 0
  • 753

Linux Memory Usage

Overview While initial views of the Linux memory statistics may suggest the system has run out of memory, the reality is that Linux uses any free RAM available as a disk cache and buffering for network services. By...
  • 0
  • 795

Plesk Onyx: Create an Additional Administrator User

Overview Plesk allows for the creation and management of multiple Administrator Accounts. Administrator Accounts are accounts that have access to wide range of settings and features within the Plesk Control Panel. Having multiple Adiministrator Accounts can be useful...
  • 0
  • 834

How to suspend a subscription in Plesk

Overview The following article demonstrates how to suspend a subscription within Plesk. This action will immediately disable any website or emails under this subscription, however it will not delete the subscription. Suspending a subscription will not suspend DNS...
  • 0
  • 857

MySQL Backups via Plesk (phpMyAdmin)

Overview This article will guide you through taking a backup of your MySQL database via Plesk, using the inbuilt phpMyAdmin utility. This highly recommended to do before running any website upgrades (eg Joomla or WordPress) or when  Instructions...
  • -1
  • 863

Windows Container based Virtual Machines

Overview Conetix runs Parallels Virtuozzo to provide container based Virtual Machines (VM's) across both Windows and Linux. This provides full server level speed for running remote desktops and applications, yet all the isolation and control of traditional virtualised...
  • 0
  • 882

How to Manage Email Notices within Plesk

Overview The following article demonstrates how to configure email notices on system events in Plesk. This allows configuring notifications for both the server administrator as well as customers. Instructions Once Logged in to the server, from the left...
  • 0
  • 908

Disable SSLv3 support in the NGINX Web Server

Overview The recently announced SSLv3 exploit also known as “POODLE” has now made SSL protocols totally vulnerable and thrust TLS as the preferred HTTPS security protocol. However you will need to disable SSL support in your web server’s SSL configuration to ensure you...
  • 1
  • 912

Disable WordPress Application Update Notifications

Overview This article aims to guide you through disabling notifications from Plesk about WordPress Updates. These are sent to the server Administrator by default, but can be disabled if excessive amounts of notifications are being sent. Instructions Log...
  • 2
  • 924

MySQL: Basic Command Quick Reference

MySQL Quick Reference Here’s a few of the basic commands to get you started with MySQL from the Linux shell. This article is intended to be a quick reference “cheat sheet” more than an explanation of each command....
  • 0
  • 935

Plesk 12: Running mod_proxy to use node.js (or similar)

Overview Many of the latest web frameworks (such as Node.js) don’t directly integrate into Parallels Plesk or any of the other web control panel systems. However, if you’ve setup the framework and have it running on your VPS, you...
  • 0
  • 942

Maintaining staging and development sites

Overview A common occurrence when when working on large sites is to spin up a copy of the site as a staging or development copy of the live website to make changes to. While this is a great...
  • 0
  • 946

Enable WHMCS Debugging

Overview By default, WHMCS will hide all errors (eg PHP errors) you experience and this results in either a blank page or a 500 error from the server. When installing new modules, it can be beneficial to test...
  • 0
  • 962

Plesk Onyx – Increasing your outgoing mail limit.

Overview By default, Conetix sets an outgoing email limit within Plesk to prevent accidental misuse of email accounts for sending spam email. We recommend leaving this restriction in place and adjusting limits as required to ensure your server...
  • 0
  • 993

Specific Website Redirection via .htaccess

Overview If you’ve added a domain alias to redirect an existing domain to your main website, by default it will redirect all calls (via an SEO friendly 301) back to the same path on your new site. For...
  • 0
  • 995

Conetix Firewall Frequently Asked Questions

Overview Conetix uses a multi-layered approach to security to ensure your data is safe. This includes advanced firewalls, server lockdown and security restrictions and for Plesk based systems a number of new security features. We run a clustered,...
  • 0
  • 1025

How to copy a database in Plesk 11.5

Overview This support article steps you through the process of making a copy of an existing database. This can be helpful when testing new software versions so that you don’t interfere with the live site and data. Instructions...
  • 0
  • 1057

How To Install PHP 7 on Plesk 12.5

Overview This article shows you how to select PHP 7 for your Plesk 12.5 based Linux server. PHP 7 was officially released on the 3rd of December 2015 and offers significant performance increases for existing PHP based platforms. We...
  • 0
  • 1072

Blocking access via a .htaccess file

Overview If you want to block access to a directory on your website or to all of your website, you can do this via a simple Apache .htacess file. This file allows you to override some of the...
  • -1
  • 1098

Plesk 12 – How to Set Mailbox Size in Plesk for a VPS

Overview The following support article demonstrates how to set the size limit for email accounts under a subscription in Plesk for a VPS. This can be done to limit the amount of hard drive space that the mailbox owner...
  • 0
  • 1112

Disable SSLv3 support in the Apache Web Server

Overview The recently announced SSLv3 exploit also known as “POODLE” has now made SSL protocols totally vulnerable and thrust TLS as the preferred HTTPS security protocol. However you will need to disable SSL support in your web server’s SSL...
  • 0
  • 1119

Plesk MySQL Import fails: the SUPER privileges required

Overview If you encounter “Access denied; you need (at least one of) the SUPER privilege(s) for this operation” during a MySQL import, this could be due to the SQL dump containing DEFINER in the create statement. For example:...
  • -1
  • 1129

WordPress Toolkit: Broken Instance

Overview Scanning for WordPress instances within the WordPress Toolkit can sometimes result in a broken instance being detected over your working instance. While there are many reasons for this, we will be covering the most common reason the for the WordPress Toolkit finding...
  • -1
  • 1142

How to install Plesk Heath Monitor

Overview Plesk Health Monitor provides you with both reporting and alerting on the resource usage of your Plesk based VPS. This allows you to not only ensure that your VPS us running at optimum levels but also preempt...
  • 0
  • 1156

Enabling DKIM Email Signing

Overview DomainKeys Identified Mail (DKIM)  is a way to validate a domain name identity that is associated with an e-mail address via cryptographic authentication. This means that your clients can verify who is sending them an e-mail and protects you against imposters pretending...
  • 0
  • 1199